Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 15 Aug 2003 20:54:54 +0100
From:      Mark Murray <mark@grondar.org>
To:        Sam Leffler <sam@errno.com>
Cc:        cvs-all@FreeBSD.org
Subject:   Re: cvs commit: src/sys/libkern arc4random.c 
Message-ID:  <200308151954.h7FJstOI004259@grimreaper.grondar.org>
In-Reply-To: Your message of "Fri, 15 Aug 2003 12:17:46 PDT." <88549156.1060949866@melange.errno.com> 

next in thread | previous in thread | raw e-mail | index | archive | help
Sam Leffler writes:
> > Having a /dev/random which is sometimes (chroot/jail) means that
> > applications running under those circumstances are incredible fragile
> > to spoofing by creating a fake "/dev/random" in some way.
> 
> openbsd defined a sysctl to get data from arc4random.  They use this as a 
> fallback if /dev/random or similar is not available.  Applications that 
> wanted to be paranoid about spoofing could use this directly.  I have not 
> compared the goodness of the data from /dev/random and arc4random.

I am working on an openbsd-compatible sysctl.

M
--
Mark Murray
iumop ap!sdn w,I idlaH



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200308151954.h7FJstOI004259>